Article: 7 Qualities of Highly Effective Hackers - published almost 9 years ago. Content: When asked to write on this topic, I admit that it made me fringe just a bit. Because I don't consider myself to be a highly effective hacker. I find myself as a noob everywhere that I'm trying to learn new things, or I am frustrated with the most ridiculous "hacker" material on the web, written by school-taught programmers that follow step by step instructi... http://www.rafayhackingarticles.net/2013/12/7-qualities-of-highly-effective-hackers.html Published: 2016 02 09 21:03:00 Received: 2022 07 18 17:48:11 Feed: Ethical Hacking - Rafayhackingarticles Source: Ethical Hacking - Rafayhackingarticles Category: Cyber Security Topic: Cyber Security |
Article: 2871997 - Update to Improve Credentials Protection and Management - Version: 5.0 - published almost 9 years ago. Content: Revision Note: V5.0 (February 9, 2016): Rereleased advisory to announce the release of update 3126593 to enable the Restricted Admin mode for Credential Security Support Provider (CredSSP) by default. See Updates Related to this Advisory for details.Summary: Microsoft is announcing the availability of updates for supported editions of Windows 7, Windows Serv... https://technet.microsoft.com/en-us/library/security/2871997 Published: 2016 02 09 18:00:00 Received: 2022 04 14 18:03:36 Feed: Latest Security Advisories Source: Latest Security Advisories Category: Alerts Topic: Vulnerabilities |
|
Article: FLARE Script Series: flare-dbg Plug-ins - published almost 9 years ago. Content: Introduction This post continues the FireEye Labs Advanced Reverse Engineering (FLARE) script series. In this post, we continue to discuss the flare-dbg project. If you haven’t read my first post on using flare-dbg to automate string decoding, be sure to check it out! We created the flare-dbg Python project to support the creation of plug-ins ... https://www.fireeye.com/blog/threat-research/2016/02/flare_script_series.html Published: 2016 02 09 12:00:00 Received: 2022 05 23 16:06:47 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: MMD-0052-2016 - Overview of "SkidDDoS" ELF++ IRC Botnet - published almost 9 years ago. Content: https://blog.malwaremustdie.org/2016/02/mmd-0052-2016-skidddos-elf-distribution.html Published: 2016 02 07 10:08:00 Received: 2021 06 06 09:04:55 Feed: Malware Must Die! Source: Malware Must Die! Category: Cyber Security Topic: Cyber Security |
|
Article: MMD-0051-2016 - Debunking a tiny ELF remote backdoor (shellcode shellshock part 2) - published almost 9 years ago. Content: https://blog.malwaremustdie.org/2016/02/mmd-0051-2016-debungking-tiny-elf.html Published: 2016 02 03 09:33:00 Received: 2021 06 06 09:04:55 Feed: Malware Must Die! Source: Malware Must Die! Category: Cyber Security Topic: Cyber Security |
Article: EncFSGui – GUI Wrapper around encfs for OSX - published almost 9 years ago. Content: https://www.corelan.be/index.php/2016/01/31/encfsgui-gui-wrapper-around-encfs-for-osx/?utm_source=rss&utm_medium=rss&utm_campaign=encfsgui-gui-wrapper-around-encfs-for-osx Published: 2016 01 31 21:08:51 Received: 2023 01 18 09:44:47 Feed: Corelan Team Source: Corelan Team Category: News Topic: Hacking |
|
Article: Hot or Not? The Benefits and Risks of iOS Remote Hot Patching - published almost 9 years ago. Content: Introduction Apple has made a significant effort to build and maintain a healthy and clean app ecosystem. The essential contributing component to this status quo is the App Store, which is protected by a thorough vetting process that scrutinizes all submitted applications. While the process is intended to protect iOS users and ensure apps meet Ap... https://www.fireeye.com/blog/threat-research/2016/01/hot_or_not_the_bene.html Published: 2016 01 27 13:00:00 Received: 2022 05 23 16:06:47 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: [a little old, but a very interesting writeup] Android privilege escalation to mediaserver from zero permissions (CVE-2014-7920 + CVE-2014-7921) - published almost 9 years ago. Content: submitted by /u/0x3d5157636b525761 [link] [comments]... https://www.reddit.com/r/vrd/comments/42k7vf/a_little_old_but_a_very_interesting_writeup/ Published: 2016 01 25 07:16:11 Received: 2021 06 06 11:29:11 Feed: Vulnerability Research and Development Source: Vulnerability Research and Development Category: Alerts Topic: Vulnerabilities |
|
Article: Oracle Critical Patch Update Advisory - January 2016
- published almost 9 years ago. Content: http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html Published: 2016 01 19 19:30:54 Received: 2021 06 06 09:03:27 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
Article: From Crash To Exploit: CVE-2015-6086 – Out of Bound Read/ASLR Bypass - published almost 9 years ago. Content: submitted by /u/hacksysteam [link] [comments] https://www.reddit.com/r/vrd/comments/41mr2q/from_crash_to_exploit_cve20156086_out_of_bound/ Published: 2016 01 19 03:42:14 Received: 2021 06 06 11:29:11 Feed: Vulnerability Research and Development Source: Vulnerability Research and Development Category: Alerts Topic: Vulnerabilities |
|
Article: Facebook Account Hacked! What To Do Now? - published almost 9 years ago. Content: Every single day i get emails in my inbox and on my facebook page from users querying about how to recover hacked facebook account and a common problem i see in all of them is that they are proactive. Everyone searches for Facebook account recovery softwares, Facebook hacking softwares and recovery mechanisms after their facebook or any other email accou... http://www.rafayhackingarticles.net/2016/01/facebook-account-hacked-what-to-do-know.html Published: 2016 01 17 16:51:00 Received: 2024 02 17 13:21:46 Feed: Ethical Hacking - Rafayhackingarticles Source: Ethical Hacking - Rafayhackingarticles Category: Cyber Security Topic: Cyber Security |
|
Article: 3109853 - Update to Improve TLS Session Resumption Interoperability - Version: 1.0 - published almost 9 years ago. Content: Revision Note: V1.0 (January 12, 2016): Advisory published.Summary: Microsoft is announcing the availability of an update to improve interoperability between Schannel-based TLS clients and 3rd-party TLS servers that enable RFC5077-based resumption and that send the NewSessionTicket message in the abbreviated TLS handshake. The update addresses an issue in sc... https://technet.microsoft.com/en-us/library/security/3109853 Published: 2016 01 12 18:00:00 Received: 2022 04 14 18:03:36 Feed: Latest Security Advisories Source: Latest Security Advisories Category: Alerts Topic: Vulnerabilities |
Article: 3118753 - Updates for ActiveX Kill Bits 3118753 - Version: 1.0 - published almost 9 years ago. Content: Revision Note: V1.0 (January 12, 2016): Advisory published.Summary: Microsoft is releasing a new set of ActiveX kill bits with this advisory. These ActiveX kill bits are included in the Internet Explorer cumulative update released on January 12, 2016. https://technet.microsoft.com/en-us/library/security/3118753 Published: 2016 01 12 18:00:00 Received: 2022 04 14 18:03:36 Feed: Latest Security Advisories Source: Latest Security Advisories Category: Alerts Topic: Vulnerabilities |
|
Article: MMD-0050-2016 - Incident report: ELF Linux/Torte infection (in Wordpress) - published almost 9 years ago. Content: https://blog.malwaremustdie.org/2016/01/mmd-0050-2016-incident-report-elf.html Published: 2016 01 12 03:20:00 Received: 2021 06 06 09:04:55 Feed: Malware Must Die! Source: Malware Must Die! Category: Cyber Security Topic: Cyber Security |
|
Article: MMD-0049-2016 - A case of java trojan (downloader/RCE) for remote minerd hack - published almost 9 years ago. Content: https://blog.malwaremustdie.org/2016/01/mmd-0049-2016-case-of-java-trojan.html Published: 2016 01 09 11:50:00 Received: 2021 06 06 09:04:55 Feed: Malware Must Die! Source: Malware Must Die! Category: Cyber Security Topic: Cyber Security |
Article: Crypto in the box, stone age edition - published almost 9 years ago. Content: https://www.corelan.be/index.php/2016/01/06/crypto-in-the-box-stone-age-edition/?utm_source=rss&utm_medium=rss&utm_campaign=crypto-in-the-box-stone-age-edition Published: 2016 01 06 11:55:33 Received: 2023 01 18 09:44:47 Feed: Corelan Team Source: Corelan Team Category: News Topic: Hacking |
|
Article: 2755801 - Update for Vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Version: 53.0 - published almost 9 years ago. Content: Revision Note: V53.0 (January 5, 2016): Added the 3133431 update to the Current Update section.Summary: Microsoft is announcing the availability of an update for Adobe Flash Player in Internet Explorer on all supported editions of Windows 8, Windows Server 2012, Windows RT, Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, and Windows 10; the update is al... https://technet.microsoft.com/en-us/library/security/2755801 Published: 2016 01 05 18:00:00 Received: 2022 04 14 18:03:36 Feed: Latest Security Advisories Source: Latest Security Advisories Category: Alerts Topic: Vulnerabilities |
Article: MMD-0048-2016 - DDOS.TF = (new) ELF & Win32 DDoS service with ASP + PHP/MySQL MOF webshells - published almost 9 years ago. Content: https://blog.malwaremustdie.org/2016/01/mmd-0048-2016-ddostf-new-elf-windows.html Published: 2016 01 05 02:39:00 Received: 2021 06 06 09:04:55 Feed: Malware Must Die! Source: Malware Must Die! Category: Cyber Security Topic: Cyber Security |
|
Article: CERT-UK Annual Report 2015/16 - published almost 9 years ago. Content: https://www.ncsc.gov.uk/report/cert-uk-annual-report-201516 Published: 2016 01 01 23:00:00 Received: 2022 07 14 16:02:10 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Finding and Exploiting Same Origin Method Execution vulnerabilities - published almost 9 years ago. Content: Recently it came to my attention that it was possible to abuse JSONP callbacks using a vulnerability known as SOME – Same Origin Method Execution which can be used by an attacker to widely abuse a user’s trust between the web application and the intended flow of execution. For example, using the SOME attack it is possible for an attacker to trick a user to v... https://penturalabs.wordpress.com/2015/12/30/finding-and-exploiting-same-origin-method-execution-vulnerabilities/ Published: 2015 12 30 23:37:46 Received: 2024 11 09 10:18:55 Feed: Pentura Labs's Blog Source: Pentura Labs's Blog Category: Cyber Security Topic: Cyber Security |
Article: FLARE Script Series: Automating Obfuscated String Decoding - published almost 9 years ago. Content: Introduction We are expanding our script series beyond IDA Pro. This post extends the FireEye Labs Advanced Reverse Engineering (FLARE) script series to an invaluable tool for the reverse engineer – the debugger. Just like IDA Pro, debuggers have scripting interfaces. For example, OllyDbg uses an asm-like scripting language, the Immunity debugger... https://www.fireeye.com/blog/threat-research/2015/12/flare_script_series.html Published: 2015 12 28 14:01:00 Received: 2022 05 23 16:06:47 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: MMD-0047-2015 - SSHV: SSH bruter ELF botnet malware w/hidden process kernel module - published almost 9 years ago. Content: https://blog.malwaremustdie.org/2015/12/mmd-0047-2015-sshv-ssh-bruter-elf.html Published: 2015 12 23 17:52:00 Received: 2021 06 06 09:04:55 Feed: Malware Must Die! Source: Malware Must Die! Category: Cyber Security Topic: Cyber Security |
|
Article: MMD-0046-2015 - Kelihos 10 nodes CNC on NJIIX, New Jersey USA, with a known russian crook who rented them - published almost 9 years ago. Content: https://blog.malwaremustdie.org/2015/12/mmd-0046-2015-kelihos-cnc-activity-on.html Published: 2015 12 21 12:53:00 Received: 2021 06 06 09:04:55 Feed: Malware Must Die! Source: Malware Must Die! Category: Cyber Security Topic: Cyber Security |
Article: Secure Application Development And Modern Defenses - published almost 9 years ago. Content: Abstract When it comes to the internet, security has always been an after-thought. A great evidence to support the theory can be seen when we look at the history of the internet. The internet was created by US military back in 1969, branded as "Arpanet" at that time. In 1973, ARPANET created TCP IP protocol suite which later enabled the development of... http://www.rafayhackingarticles.net/2015/12/secure-application-development-Modern-Defenses.html Published: 2015 12 18 19:51:00 Received: 2024 02 17 13:21:46 Feed: Ethical Hacking - Rafayhackingarticles Source: Ethical Hacking - Rafayhackingarticles Category: Cyber Security Topic: Cyber Security |
|
Article: Six Ways to Automatically Find Software Bugs by Fan Gang [PDF] - published almost 9 years ago. Content: submitted by /u/turnersr [link] [comments] https://www.reddit.com/r/vrd/comments/3wu1py/six_ways_to_automatically_find_software_bugs_by/ Published: 2015 12 14 21:03:42 Received: 2021 06 06 11:29:11 Feed: Vulnerability Research and Development Source: Vulnerability Research and Development Category: Alerts Topic: Vulnerabilities |
|
Article: 3123040 - Inadvertently Disclosed Digital Certificate Could Allow Spoofing - Version: 1.0 - published almost 9 years ago. Content: Revision Note: V1.0 (December 8, 2015): Advisory published.Summary: Microsoft is aware of an SSL/TLS digital certificate for *.xboxlive.com for which the private keys were inadvertently disclosed. The certificate could be used in attempts to perform man-in-the-middle attacks. It cannot be used to issue other certificates, impersonate other domains, or sign c... https://technet.microsoft.com/en-us/library/security/3123040 Published: 2015 12 08 18:00:00 Received: 2022 04 14 18:03:36 Feed: Latest Security Advisories Source: Latest Security Advisories Category: Alerts Topic: Vulnerabilities |
Article: 3057154 - Update to Harden Use of DES Encryption - Version: 1.1 - published almost 9 years ago. Content: Revision Note: V1.1 (December 8, 2015): Advisory updated to include more information about disabling DES by default in Windows 7 and Windows Server 2008 R2 and later operating systems. The update allows DES to be used between client and server to address scenarios in which DES is still required for application compatibility reasons.Summary: Microsoft is anno... https://technet.microsoft.com/en-us/library/security/3057154 Published: 2015 12 08 18:00:00 Received: 2022 04 14 18:03:36 Feed: Latest Security Advisories Source: Latest Security Advisories Category: Alerts Topic: Vulnerabilities |
|
Article: Modern Binary Attacks and Defences in the Windows Environment – Fighting Against Microsoft EMET in Seven Rounds by Zoltan L. Nemeth - published almost 9 years ago. Content: submitted by /u/turnersr [link] [comments] https://www.reddit.com/r/vrd/comments/3vgb0n/modern_binary_attacks_and_defences_in_the_windows/ Published: 2015 12 04 19:35:23 Received: 2021 06 06 11:29:11 Feed: Vulnerability Research and Development Source: Vulnerability Research and Development Category: Alerts Topic: Vulnerabilities |
|
Article: MMD-0045-2015 - KDefend: a new ELF threat with a disclaimer - published almost 9 years ago. Content: https://blog.malwaremustdie.org/2015/12/mmd-0045-2015-kdefend-new-elf-threat.html Published: 2015 12 03 21:44:00 Received: 2021 06 06 09:04:55 Feed: Malware Must Die! Source: Malware Must Die! Category: Cyber Security Topic: Cyber Security |
Article: 3119884 - Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Version: 1.0 - published almost 9 years ago. Content: Revision Note: V1.0 (November 30, 2015): Advisory published.Summary: Microsoft is aware of unconstrained digital certificates from Dell Inc. for which the private keys were inadvertently disclosed. One of these unconstrained certificates could be used to issue other certificates, impersonate other domains, or sign code. In addition, these certificates could ... https://technet.microsoft.com/en-us/library/security/3119884 Published: 2015 11 30 18:00:00 Received: 2022 04 14 18:03:36 Feed: Latest Security Advisories Source: Latest Security Advisories Category: Alerts Topic: Vulnerabilities |
|
Article: Nmap 7 Released! - published about 9 years ago. Content: http://www.livehacking.com/2015/11/23/nmap-7-released/ Published: 2015 11 24 02:40:11 Received: 2021 06 06 09:04:45 Feed: LIVE HACKING Source: LIVE HACKING Category: Cyber Security Topic: Cyber Security |
|
Article: FLARE IDA Pro Script Series: Automating Function Argument Extraction - published about 9 years ago. Content: https://www.fireeye.com/blog/threat-research/2015/11/flare_ida_pro_script.html Published: 2015 11 16 13:00:00 Received: 2022 05 23 16:06:47 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Oracle Security Alert for CVE-2015-4852 - 10 November 2015
- published about 9 years ago. Content: http://www.oracle.com/technetwork/topics/security/alert-cve-2015-4852-2763333.html Published: 2015 11 10 19:30:54 Received: 2021 06 06 09:03:27 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
|
Article: 3108638 - Update for Windows Hyper-V to Address CPU Weakness - Version: 1.0 - published about 9 years ago. Content: Revision Note: V1.0 (November 10, 2015): Advisory published.Summary: Microsoft is announcing the availability of a security update for Windows Hyper-V to protect against a denial of service condition that can be triggered with certain central processing unit (CPU) chipsets. Although the weakness resides in the chipset, Microsoft is issuing this security upda... https://technet.microsoft.com/en-us/library/security/3108638 Published: 2015 11 10 18:00:00 Received: 2022 04 14 18:03:36 Feed: Latest Security Advisories Source: Latest Security Advisories Category: Alerts Topic: Vulnerabilities |
Article: Vulnerability Summary for the Week of November 2, 2015 - published about 9 years ago. Content: https://www.cisa.gov/news-events/bulletins/sb15-313 Published: 2015 11 09 21:11:41 Received: 2023 03 19 13:24:20 Feed: CISA Bulletins Source: Cybersecurity and Infrastructure Security Agency (CISA) Category: Bulletins Topic: Cyber Security |
|
Article: iBackDoor: High-Risk Code Hits iOS Apps - published about 9 years ago. Content: Introduction FireEye mobile researchers recently discovered potentially “backdoored” versions of an ad library embedded in thousands of iOS apps originally published in the Apple App Store. The affected versions of this library embedded functionality in iOS apps that used the library to display ads, allowing for potential malicious access to se... https://www.fireeye.com/blog/threat-research/2015/11/ibackdoor_high-risk.html Published: 2015 11 04 18:00:00 Received: 2022 05 23 16:06:45 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: XcodeGhost S: A New Breed Hits the US - published about 9 years ago. Content: Just over a month ago, iOS users were warned of the threat to their devices by the XcodeGhost malware. Apple quickly reacted, taking down infected apps from the App Store and releasing new security features to stop malicious activities. Through continuous monitoring of our customers’ networks, FireEye researchers have found that, despite the quick ... https://www.fireeye.com/blog/threat-research/2015/11/xcodeghost_s_a_new.html Published: 2015 11 03 12:27:00 Received: 2022 05 23 16:06:47 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: iBackDoor: High-risk Code Sneaks into the App Store - published about 9 years ago. Content: The library embeds backdoors in unsuspecting apps that make use of it to display ads, exposing sensitive data and functionality. The backdoors can be controlled remotely by loading JavaScript code from remote servers to perform the following actions: Capture audio and screenshots. Monitor and upload device location. Read/delete/create/modify file... https://www.fireeye.com/blog/threat-research/2015/10/ibackdoor_high-risk.html Published: 2015 10 26 13:51:00 Received: 2022 05 23 16:06:46 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Oracle Critical Patch Update Advisory - October 2015
- published about 9 years ago. Content: http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html Published: 2015 10 20 19:30:54 Received: 2021 06 06 09:03:27 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
|
Article: Simple Method To Bypass Cloudflare - published about 9 years ago. Content: I get asked this question a lot so I thought I'd finally publish my response here for the sake of everyone. Cloudflare is the name of a company who provide DDoS protection to websites. They do this by basically filtering out the attack traffic from legitimate traffic so your site remains unaffected. They do this by inserting a proxy between your website and ... http://trojan7malware.blogspot.com/2015/10/simple-method-to-bypass-cloudflare.html Published: 2015 10 20 16:54:00 Received: 2023 03 31 23:02:32 Feed: Trojan7Malware Source: Trojan7Malware Category: Cyber Security Topic: Cyber Security |
Article: [IRCCloud] History and Another XSS Bug Bounty - published about 9 years ago. Content: Personally, I have been a user of IRC since 2004 on some private networks and some other well-known ones such as Freenode. However, it was always inconvenient to have to set up an IRC Bouncer, so when IRCCloud came around, I was excited to try it and see if it provided me with a method of staying connected to all the required networks without having to downl... https://penturalabs.wordpress.com/2015/10/14/irccloud-history-and-another-xss-bug-bounty/ Published: 2015 10 14 10:50:15 Received: 2021 06 06 09:04:46 Feed: Pentura Labs's Blog Source: Pentura Labs's Blog Category: Cyber Security Topic: Cyber Security |
|
Article: 2960358 - Update for Disabling RC4 in .NET TLS - Version: 2.0 - published about 9 years ago. Content: Revision Note: V2.0 (October 13, 2015): Advisory revised to broaden the affected software list to include Windows 10 systems that are running .NET Framework 3.5 applications and systems with .NET Framework 4.6 installed that are running .NET Framework 4.5/4.5.1/4.5.2 applications, and to provide customers running these configurations with steps for manually ... https://technet.microsoft.com/en-us/library/security/2960358 Published: 2015 10 13 17:00:00 Received: 2022 04 14 18:03:36 Feed: Latest Security Advisories Source: Latest Security Advisories Category: Alerts Topic: Vulnerabilities |
Article: 3097966 - Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Version: 2.0 - published about 9 years ago. Content: Revision Note: V2.0 (October 13, 2015): Advisory revised to notify customers that an update is available that modifies the Code Integrity component in Windows to extend trust removal for the four digital certificates addressed by this advisory to also preclude kernel-mode code signing.Summary: Microsoft is aware of four digital certificates that were inadver... https://technet.microsoft.com/en-us/library/security/3097966 Published: 2015 10 13 17:00:00 Received: 2022 04 14 18:03:36 Feed: Latest Security Advisories Source: Latest Security Advisories Category: Alerts Topic: Vulnerabilities |
|
Article: 3042058 - Update to Default Cipher Suite Priority Order - Version: 1.1 - published about 9 years ago. Content: Revision Note: V1.1 (October 13, 2015): Advisory revised to announce that the Default Cipher Suite Prioritization update (3042058), originally released May 12, 2015 via the Microsoft Download Center (DLC) only, is now also available via Microsoft Update (MU) and Windows Server Update Services (WSUS). This is an update offering venue change only. There were n... https://technet.microsoft.com/en-us/library/security/3042058 Published: 2015 10 13 17:00:00 Received: 2022 04 14 18:03:36 Feed: Latest Security Advisories Source: Latest Security Advisories Category: Alerts Topic: Vulnerabilities |
|
Article: How to become a pentester - published about 9 years ago. Content: https://www.corelan.be/index.php/2015/10/13/how-to-become-a-pentester/?utm_source=rss&utm_medium=rss&utm_campaign=how-to-become-a-pentester Published: 2015 10 13 12:30:35 Received: 2023 01 18 09:44:47 Feed: Corelan Team Source: Corelan Team Category: News Topic: Hacking |
Article: [IRCCloud] Inadequate input validation on API endpoint leading to self denial of service and increased system load - published about 9 years ago. Content: So as you do, I was just looking around, manually fuzzing some Web Sockets requests, seeing if I could get any sort of XSS, Remote IRC Command Injection or SQLi mainly – ended up that I didn’t find much there that worse worth noting. So I started seeing if their logic was all alright, so one of their requests looked similar to: {“_reqid”:1234, “cid”:5678, “t... https://penturalabs.wordpress.com/2015/10/13/fuzzing-for-fun-and-profit/ Published: 2015 10 13 12:04:47 Received: 2021 06 06 09:04:46 Feed: Pentura Labs's Blog Source: Pentura Labs's Blog Category: Cyber Security Topic: Cyber Security |
|
Article: How I hacked my IP camera, and found this backdoor account - published about 9 years ago. Content: The time has come. I bought my second IoT device - in the form of a cheap IP camera. As it was the most affordable among all others, my expectations regarding security was low. But this camera was still able to surprise me. Maybe I will disclose the camera model used in my hack in this blog later, but first, I will try to contact someone regarding these i... https://jumpespjump.blogspot.com/2015/09/how-i-hacked-my-ip-camera-and-found.html Published: 2015 09 26 12:02:00 Received: 2024 03 12 23:22:33 Feed: Jump ESP, jump! Source: Jump ESP, jump! Category: Cyber Security Topic: Cyber Security |
Article: Paypal Mobile Verification And Payment Restrictions Bypass - published about 9 years ago. Content: In this post, i would like to share a very simple logic flaw I found earlier this year I have found a way to circumvent mobile verification by utilizing a different portal for logging into a paypal account. The flaw lies in the fact that paypal does not perform two step verification/authorization checks on all different portals that are used to log into ... http://www.rafayhackingarticles.net/2015/09/paypal-mobile-verification-bypass.html Published: 2015 09 25 19:03:00 Received: 2024 02 17 13:21:46 Feed: Ethical Hacking - Rafayhackingarticles Source: Ethical Hacking - Rafayhackingarticles Category: Cyber Security Topic: Cyber Security |
Article: 3083992 - Update to Improve AppLocker Publisher Rule Enforcement - Version: 1.0 - published about 9 years ago. Content: Revision Note: V1.0 (September 8, 2015): Summary: Microsoft is announcing the availability of a defense-in-depth update that improves the enforcement of publisher rules by Windows AppLocker in Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, Windows 8.1, and Windows Server 2012 R2. The improvement is part of ongoing efforts to bolster the e... https://technet.microsoft.com/en-us/library/security/3083992 Published: 2015 09 08 17:00:00 Received: 2022 04 14 18:03:37 Feed: Latest Security Advisories Source: Latest Security Advisories Category: Alerts Topic: Vulnerabilities |
|
Article: 2015 FLARE-ON Challenge Solutions - published about 9 years ago. Content: The first few challenges narrowed the playing field drastically, with most serious contestants holding firm through challenges 4-9. The last two increased the difficulty level and proved a difficult final series of challenges for a well-earned finish line. The FLARE On Challenge always reaches a very wide international audience. Outside of the USA, ... https://www.fireeye.com/blog/threat-research/2015/09/flare-on_challenges.html Published: 2015 09 08 14:56:00 Received: 2022 05 23 16:06:47 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: How to secure your home against "Internet of Things" and FUD - published over 9 years ago. Content: TL;DR, most of the security news about IoT is full of FUD. Always put the risks in context - who can exploit this and what can the attacker do with it. Most story only covers the latter. Introduction There is rarely a day without news that another "Internet of Things" got hacked. "Smart" safes, "smart" rifles, "smart" cars, "smart" fridges, "smart" TVs,... https://jumpespjump.blogspot.com/2015/08/how-to-secure-your-home-against.html Published: 2015 08 20 11:37:00 Received: 2024 03 12 23:22:33 Feed: Jump ESP, jump! Source: Jump ESP, jump! Category: Cyber Security Topic: Cyber Security |
|
Article: Potao Express samples - published over 9 years ago. Content: http://www.welivesecurity.com/2015/07/30/operation-potao-express/ http://www.welivesecurity.com/wp-content/uploads/2015/07/Operation-Potao-Express_final_v2.pdf TL; DR 2011- July 2015 Aka Sapotao and node69 Group - Sandworm / Quedagh APT Vectors - USB, exe as doc, xls Victims - RU, BY, AM, GE Victims - MMM group, UA gov truecryptrussia.ru has be... https://contagiodump.blogspot.com/2015/08/potao-express-samples.html Published: 2015 08 12 12:24:00 Received: 2024 03 13 18:00:19 Feed: contagio Source: contagio Category: Cyber Security Topic: Cyber Security |
|
Click to Open Code Editor